Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-10397


In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:[email protected]/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).


Published

2017-07-10T14:29:00.417

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application php php ≤ 5.6.27 Yes
Application php php 7.0.0 Yes
Application php php 7.0.1 Yes
Application php php 7.0.2 Yes
Application php php 7.0.3 Yes
Application php php 7.0.4 Yes
Application php php 7.0.5 Yes
Application php php 7.0.6 Yes
Application php php 7.0.7 Yes
Application php php 7.0.8 Yes
Application php php 7.0.9 Yes
Application php php 7.0.10 Yes
Application php php 7.0.11 Yes
Application php php 7.0.12 Yes

References